Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Unions (Score 1) 220

Unions require the leverage of work stoppage causing production blockage, but this doesn't work when the employer can pick up shop and move to cheaper labor. Combine this with the lack of import tariffs and there is no leverage for a labor union to wield. For unions to work now, you'd have to have the workers of the world unite, which was a Socialist rallying call if I remember my history. We all know what Americans think of Socialism, especially the sneering libertarians found in IT departments.

Unions will not work now like they did 100 years ago, at least not in the USA while there is such great disparity between here and there. Something that may or may not comfort you is that _everything_ in the U.S. will have to level down, including labor costs/wages, rents/returns, property values, profits -- it's called deflation and it's unavoidable.

Comment Why Transparency is Important (Score 4, Insightful) 33

It should be clear by now that having anything less than complete transparency for these agencies is foolish, because we become the target of the tools when they are used in secret silence. Elected representatives are worthless in this regard. We need transparency via reporting requirements and guidelines that give full information to the public.

If we are expected to be responsible for what these agencies do, then we need to know what they are doing.

Comment Profit! (Score 2) 95

But, but...what about the poor baby profits?

Seriously, you won't see these corporations do anything like this until they are forced to do so with heavy regulations, potential heavy fines and the real possibility of criminal prosecution upon proof of criminal negligence by a prosecuting attorney.

MBA school teaches them this: costs equal profits taken out of your pocket, so anything you can do to put the costs anywhere else is the profit in your pocket. This is how they think and how they operate. This is why you don't want business running and maintaining your infrastructure.

Submission + - The lack of US cybersecurity across the electric grid (thebulletin.org)

Lasrick writes: Meghan McGuinness of the Bipartisan Policy Center writes about the Electric Grid Cybersecurity Initiative, a collaborative effort between the center’s Energy and Homeland Security Projects. She points out that over half the attacks on US critical infrastructure sectors last year were on the energy sector. Cyber attacks could come from a variety of sources, and 'a large-scale cyber attack or combined cyber and physical attack could lead to enormous costs, potentially triggering sustained power outages over large portions of the electric grid and prolonged disruptions in communications, food and water supplies, and health care delivery.' ECGI is recommending the creation of a new, industry-supported model that would create incentives for the continual improvement and adaptation needed to respond effectively to rapidly evolving cyber threats. The vulnerability of the grid has been much discussed this last week; McGuinness's recommendations are a good place to start.

Submission + - Hackers Hijack AWS Accounts To Make Money At Users' Expense (readwrite.com)

redletterdave writes: Amazon Web Services gives developers access to massive computing capability. Now hackers have found ways to hijack some accounts and use that power to make money on someone else's dime. In addition to developers' usernames and passwords for their accounts, AWS uses "access keys" that are easier to include in software. And that's the problem—developers include these keys in their software, including copies of the software they store in public source-code repositories like GitHub. As a result, hackers can rent computing power from Amazon on others' accounts, racking up thousands of dollars in charges on servers in Amazon data centers as far away as Tokyo, São Paulo, Sydney, and Singapore.

Submission + - Promising Solar Cell Materials Also Emit Laser Light (acs.org)

An anonymous reader writes: Perovskites have recently become a hot topic in photovoltaics research. They have high light-to-electricity conversion efficiencies, and are inexpensive and easy to make. Scientists in the U.K. now show that the materials also can be used to make lasers. The researchers demonstrated that a perovskite can convert 70% of absorbed light into emitted light. This remarkably high luminescent efficiency suggests the materials could be used in low-cost lasers and LEDs.

Submission + - Snowden Used the Operating System Designed for Internet Anonymity

Hugh Pickens DOT Com writes: When Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. Now Klint Finley reports that Snowden also used The Amnesic Incognito Live System (Tails) to keep his communications out of the NSA’s prying eyes. Tails is a kind of computer-in-a-box using a version of the Linux operating system optimized for anonymity that you install on a DVD or USB drive, boot your computer from and you’re pretty close to anonymous on the internet. "Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn’t store any data locally," writes Finley. "This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources." The developers of Tails are, appropriately, anonymous. They’re protecting their identities, in part, to help protect the code from government interference. “The NSA has been pressuring free software projects and developers in various ways,” the group says. But since we don’t know who wrote Tails, how do we now it isn’t some government plot designed to snare activists or criminals? A couple of ways, actually. One of the Snowden leaks show the NSA complaining about Tails in a Power Point Slide; if it’s bad for the NSA, it’s safe to say it’s good for privacy. And all of the Tails code is open source, so it can be inspected by anyone worried about foul play. "With Tails", say the distro developers, "we provide a tongue and a pen protected by state-of-the-art cryptography to guarantee basic human rights and allow journalists worldwide to work and communicate freely and without fear of reprisal."

Submission + - The Security Of The Most Popular Programming Languages

An anonymous reader writes: Deciding which programming language to use is often based on considerations such as what the development team is most familiar with, what will generate code the fastest, or simply what will get the job done. How secure the language might be is simply an afterthought, which is usually too late. A new WhiteHat Security report approaches application security not from the standpoint of what risks exist on sites and applications once they have been pushed into production, but rather by examining how the languages themselves perform in the field. In doing so, we hope to elevate security considerations and deepen those conversations earlier in the decision process, which will ultimately lead to more secure websites and applications.

Comment Ability to design and write software... (Score 5, Insightful) 581

...requires foundations laid down in the 5th and 6th grade of school, mostly math, but also the interest and desire to learn. Some people get it, some don't get it. So it's more accurate to say that some coal miners may be able to learn to code: Watch out for those blanket generalizations, they bite back.

Slashdot Top Deals

"Experience has proved that some people indeed know everything." -- Russell Baker

Working...